Distributed Chasing of Network Intruders by Mobile Agents

نویسندگان

  • Lélia Blin
  • Pierre Fraigniaud
  • Nicolas Nisse
  • Sandrine Vial
چکیده

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Distributed Chasing of Network Intruders by Mobile Agents. Lélia Blin, Pierre Fraigniaud, Nicolas Nisse, Sandrine Vial

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs

Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...

متن کامل

Dynamic Obstacle Avoidance by Distributed Algorithm based on Reinforcement Learning (RESEARCH NOTE)

In this paper we focus on the application of reinforcement learning to obstacle avoidance in dynamic Environments in wireless sensor networks. A distributed algorithm based on reinforcement learning is developed for sensor networks to guide mobile robot through the dynamic obstacles. The sensor network models the danger of the area under coverage as obstacles, and has the property of adoption o...

متن کامل

A Cluster-Based Distributed Hierarchical IDS for MANETs

Many attempts were made to secure wireless ad hoc networks, but due to special ad-hoc nature, which is lack of a fixed infrastructure and central management, finding an optimal and comprehensive security solution is still a research challenge. Intrusion detection system is one of key techniques and best solution instead of intrusion protection behind protecting a network against intruders on mo...

متن کامل

Paradigms for Reliable Communication Protocols in Mobile Agents based Systems

Mobile Agents are regarded as a promising paradigm for future distributed computing. Among essential features of mobile agents, communication is a fundamental ability that enables mobile agents to cooperate with each other. But the presence of mobility raises a number of new challenges in designing message delivery protocols for effective and efficient communications between mobile agents, espe...

متن کامل

Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework

In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. To address the securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018